12.07.2015 Views

Brocade MLX Series and Brocade NetIron XMR Diagnostic Guide ...

Brocade MLX Series and Brocade NetIron XMR Diagnostic Guide ...

Brocade MLX Series and Brocade NetIron XMR Diagnostic Guide ...

SHOW MORE
SHOW LESS
  • No tags were found...

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Denial of Service attacks 9802.1X: Timer tick expired802.1X: Timer tick expired802.1X: Timer tick expired802.1X: port 4/1 aWhile timer (Supplicant) started for 30 secs802.1X: port 4/1 aWhile timer (AuthServer) started for 30 secs802.1X: port 4/1 aWhile timer (AuthServer) started for 30 secs802.1X: Timer tick expired802.1X: port 4/1 aWhile timer (Supplicant) started for 30 secs802.1X: port 4/1 aWhile timer (AuthServer) started for 30 secs802.1X: Timer tick expired802.1X: Port 3/15 txEAP timer expired. Transmitting an EAP ReqId802.1X: Port 3/17 txEAP timer expired. Transmitting an EAP ReqId802.1X: Port 3/18 txEAP timer expired. Transmitting an EAP ReqId802.1X: Port 3/19 txEAP timer expired. Transmitting an EAP ReqId802.1X: Port 3/20 txEAP timer expired. Transmitting an EAP ReqId802.1X: port 4/1 aWhile timer (AuthServer) started for 30 secs802.1X: port 4/1 aWhile timer (Supplicant) started for 30 secs802.1X: port 4/1 aWhile timer (AuthServer) started for 30 secs802.1X: Timer tick expired802.1X: port 4/1 aWhile timer (AuthServer) started for 30 secs802.1X: port 4/1 aWhile timer (Supplicant) started for 30 secs802.1X: port 4/1 aWhile timer (AuthServer) started for 30 secs802.1X: Timer tick expiredConfiguration notes• The client’s 802.1x MAC session establishes a relationship between the user name <strong>and</strong> theMAC address used for authentication. If a user attempts to gain access from different clients(with different MAC addresses), the user must be authenticated from each client.• If a client has been denied access to the network (that is, the client’s 802.1x MAC session isset to “access-denied”), then you can cause the client to be re-authenticated by manuallydisconnecting the client from the network, or by using the clear dot1x mac-session comm<strong>and</strong>.• When a client has been denied access to the network, the 802.1x MAC session is aged out ifno traffic is received from the client’s MAC address over a fixed hardware aging period (70seconds), plus a configurable software aging period. You can optionally change the softwareaging period for 802.1x MAC sessions or disable aging altogether. After the denied client’s802.1x MAC session is aged out, traffic from that client is no longer blocked, <strong>and</strong> the client canbe re-authenticated.• To implement 802.1x port security, at least one of the RADIUS servers identified to the <strong>Brocade</strong>device must support the 802.1x st<strong>and</strong>ard.Denial of Service attacksIn a Denial of Service (DoS) attack, a router is flooded with useless packets, hindering normaloperation. <strong>Brocade</strong> devices include measures for defending against two types of DoS attacks:Smurf attacks <strong>and</strong> TCP SYN attacks.A Smurf attack is a kind of DoS attack where an attacker causes a victim to be flooded with ICMPecho (Ping) replies sent from another (intermediary) network. For detailed information about how toprevent Smurf attacks, refer to the <strong>NetIron</strong> <strong>Series</strong> Configuration <strong>Guide</strong>.<strong>Brocade</strong> <strong>MLX</strong> <strong>Series</strong> <strong>and</strong> <strong>Brocade</strong> <strong>NetIron</strong> <strong>XMR</strong> <strong>Diagnostic</strong> <strong>Guide</strong> 30753-1002426-02

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!